SqliMatchStatement
A rule statement that inspects for malicious SQL code. Attackers insert malicious SQL code into web requests to do things like modify your database or extract data from it.
Contents
- FieldToMatch
-
The part of the web request that you want AWS WAF to inspect.
Type: FieldToMatch object
Required: Yes
- TextTransformations
-
Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass detection. Text transformations are used in rule match statements, to transform the
FieldToMatch
request component before inspecting it, and they're used in rate-based rule statements, to transform request components before using them as custom aggregation keys. If you specify one or more transformations to apply, AWS WAF performs all transformations on the specified content, starting from the lowest priority setting, and then uses the transformed component contents.Type: Array of TextTransformation objects
Array Members: Minimum number of 1 item.
Required: Yes
- SensitivityLevel
-
The sensitivity that you want AWS WAF to use to inspect for SQL injection attacks.
HIGH
detects more attacks, but might generate more false positives, especially if your web requests frequently contain unusual strings. For information about identifying and mitigating false positives, see Testing and tuning in the AWS WAF Developer Guide.LOW
is generally a better choice for resources that already have other protections against SQL injection attacks or that have a low tolerance for false positives.Default:
LOW
Type: String
Valid Values:
LOW | HIGH
Required: No
See Also
For more information about using this API in one of the language-specific AWS SDKs, see the following: